diff options
author | Harvey Harrison <harvey.harrison@gmail.com> | 2008-03-05 18:03:59 -0500 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2008-04-18 06:26:07 -0400 |
commit | dd6f953adb5c4deb9cd7b6a5054e7d5eafe4ed71 (patch) | |
tree | 0ed459ca8da43b7e0486c8f0a840845a731920bf /security/selinux | |
parent | b0c636b99997c8594da6a46e166ce4fcf6956fda (diff) |
security: replace remaining __FUNCTION__ occurrences
__FUNCTION__ is gcc-specific, use __func__
Signed-off-by: Harvey Harrison <harvey.harrison@gmail.com>
Cc: James Morris <jmorris@namei.org>
Cc: Stephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security/selinux')
-rw-r--r-- | security/selinux/hooks.c | 16 | ||||
-rw-r--r-- | security/selinux/netlink.c | 2 | ||||
-rw-r--r-- | security/selinux/selinuxfs.c | 8 | ||||
-rw-r--r-- | security/selinux/ss/services.c | 4 |
4 files changed, 15 insertions, 15 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index d569cde440e6..74bb74b4db08 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c | |||
@@ -668,7 +668,7 @@ static int selinux_set_mnt_opts(struct super_block *sb, | |||
668 | rc = security_fs_use(sb->s_type->name, &sbsec->behavior, &sbsec->sid); | 668 | rc = security_fs_use(sb->s_type->name, &sbsec->behavior, &sbsec->sid); |
669 | if (rc) { | 669 | if (rc) { |
670 | printk(KERN_WARNING "%s: security_fs_use(%s) returned %d\n", | 670 | printk(KERN_WARNING "%s: security_fs_use(%s) returned %d\n", |
671 | __FUNCTION__, sb->s_type->name, rc); | 671 | __func__, sb->s_type->name, rc); |
672 | goto out; | 672 | goto out; |
673 | } | 673 | } |
674 | 674 | ||
@@ -1134,7 +1134,7 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent | |||
1134 | } | 1134 | } |
1135 | if (!dentry) { | 1135 | if (!dentry) { |
1136 | printk(KERN_WARNING "%s: no dentry for dev=%s " | 1136 | printk(KERN_WARNING "%s: no dentry for dev=%s " |
1137 | "ino=%ld\n", __FUNCTION__, inode->i_sb->s_id, | 1137 | "ino=%ld\n", __func__, inode->i_sb->s_id, |
1138 | inode->i_ino); | 1138 | inode->i_ino); |
1139 | goto out_unlock; | 1139 | goto out_unlock; |
1140 | } | 1140 | } |
@@ -1172,7 +1172,7 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent | |||
1172 | if (rc < 0) { | 1172 | if (rc < 0) { |
1173 | if (rc != -ENODATA) { | 1173 | if (rc != -ENODATA) { |
1174 | printk(KERN_WARNING "%s: getxattr returned " | 1174 | printk(KERN_WARNING "%s: getxattr returned " |
1175 | "%d for dev=%s ino=%ld\n", __FUNCTION__, | 1175 | "%d for dev=%s ino=%ld\n", __func__, |
1176 | -rc, inode->i_sb->s_id, inode->i_ino); | 1176 | -rc, inode->i_sb->s_id, inode->i_ino); |
1177 | kfree(context); | 1177 | kfree(context); |
1178 | goto out_unlock; | 1178 | goto out_unlock; |
@@ -1187,7 +1187,7 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent | |||
1187 | if (rc) { | 1187 | if (rc) { |
1188 | printk(KERN_WARNING "%s: context_to_sid(%s) " | 1188 | printk(KERN_WARNING "%s: context_to_sid(%s) " |
1189 | "returned %d for dev=%s ino=%ld\n", | 1189 | "returned %d for dev=%s ino=%ld\n", |
1190 | __FUNCTION__, context, -rc, | 1190 | __func__, context, -rc, |
1191 | inode->i_sb->s_id, inode->i_ino); | 1191 | inode->i_sb->s_id, inode->i_ino); |
1192 | kfree(context); | 1192 | kfree(context); |
1193 | /* Leave with the unlabeled SID */ | 1193 | /* Leave with the unlabeled SID */ |
@@ -2437,7 +2437,7 @@ static int selinux_inode_init_security(struct inode *inode, struct inode *dir, | |||
2437 | printk(KERN_WARNING "%s: " | 2437 | printk(KERN_WARNING "%s: " |
2438 | "security_transition_sid failed, rc=%d (dev=%s " | 2438 | "security_transition_sid failed, rc=%d (dev=%s " |
2439 | "ino=%ld)\n", | 2439 | "ino=%ld)\n", |
2440 | __FUNCTION__, | 2440 | __func__, |
2441 | -rc, inode->i_sb->s_id, inode->i_ino); | 2441 | -rc, inode->i_sb->s_id, inode->i_ino); |
2442 | return rc; | 2442 | return rc; |
2443 | } | 2443 | } |
@@ -2671,7 +2671,7 @@ static void selinux_inode_post_setxattr(struct dentry *dentry, char *name, | |||
2671 | rc = security_context_to_sid(value, size, &newsid); | 2671 | rc = security_context_to_sid(value, size, &newsid); |
2672 | if (rc) { | 2672 | if (rc) { |
2673 | printk(KERN_WARNING "%s: unable to obtain SID for context " | 2673 | printk(KERN_WARNING "%s: unable to obtain SID for context " |
2674 | "%s, rc=%d\n", __FUNCTION__, (char*)value, -rc); | 2674 | "%s, rc=%d\n", __func__, (char*)value, -rc); |
2675 | return; | 2675 | return; |
2676 | } | 2676 | } |
2677 | 2677 | ||
@@ -5017,14 +5017,14 @@ static int selinux_register_security (const char *name, struct security_operatio | |||
5017 | { | 5017 | { |
5018 | if (secondary_ops != original_ops) { | 5018 | if (secondary_ops != original_ops) { |
5019 | printk(KERN_ERR "%s: There is already a secondary security " | 5019 | printk(KERN_ERR "%s: There is already a secondary security " |
5020 | "module registered.\n", __FUNCTION__); | 5020 | "module registered.\n", __func__); |
5021 | return -EINVAL; | 5021 | return -EINVAL; |
5022 | } | 5022 | } |
5023 | 5023 | ||
5024 | secondary_ops = ops; | 5024 | secondary_ops = ops; |
5025 | 5025 | ||
5026 | printk(KERN_INFO "%s: Registering secondary module %s\n", | 5026 | printk(KERN_INFO "%s: Registering secondary module %s\n", |
5027 | __FUNCTION__, | 5027 | __func__, |
5028 | name); | 5028 | name); |
5029 | 5029 | ||
5030 | return 0; | 5030 | return 0; |
diff --git a/security/selinux/netlink.c b/security/selinux/netlink.c index b59871d74dad..6214a7a73149 100644 --- a/security/selinux/netlink.c +++ b/security/selinux/netlink.c | |||
@@ -89,7 +89,7 @@ out: | |||
89 | nlmsg_failure: | 89 | nlmsg_failure: |
90 | kfree_skb(skb); | 90 | kfree_skb(skb); |
91 | oom: | 91 | oom: |
92 | printk(KERN_ERR "SELinux: OOM in %s\n", __FUNCTION__); | 92 | printk(KERN_ERR "SELinux: OOM in %s\n", __func__); |
93 | goto out; | 93 | goto out; |
94 | } | 94 | } |
95 | 95 | ||
diff --git a/security/selinux/selinuxfs.c b/security/selinux/selinuxfs.c index 1d996bb953b8..26fabad09769 100644 --- a/security/selinux/selinuxfs.c +++ b/security/selinux/selinuxfs.c | |||
@@ -392,7 +392,7 @@ static ssize_t sel_write_context(struct file * file, char *buf, size_t size) | |||
392 | 392 | ||
393 | if (len > SIMPLE_TRANSACTION_LIMIT) { | 393 | if (len > SIMPLE_TRANSACTION_LIMIT) { |
394 | printk(KERN_ERR "%s: context size (%u) exceeds payload " | 394 | printk(KERN_ERR "%s: context size (%u) exceeds payload " |
395 | "max\n", __FUNCTION__, len); | 395 | "max\n", __func__, len); |
396 | length = -ERANGE; | 396 | length = -ERANGE; |
397 | goto out; | 397 | goto out; |
398 | } | 398 | } |
@@ -645,7 +645,7 @@ static ssize_t sel_write_create(struct file * file, char *buf, size_t size) | |||
645 | 645 | ||
646 | if (len > SIMPLE_TRANSACTION_LIMIT) { | 646 | if (len > SIMPLE_TRANSACTION_LIMIT) { |
647 | printk(KERN_ERR "%s: context size (%u) exceeds payload " | 647 | printk(KERN_ERR "%s: context size (%u) exceeds payload " |
648 | "max\n", __FUNCTION__, len); | 648 | "max\n", __func__, len); |
649 | length = -ERANGE; | 649 | length = -ERANGE; |
650 | goto out3; | 650 | goto out3; |
651 | } | 651 | } |
@@ -822,7 +822,7 @@ static ssize_t sel_write_member(struct file * file, char *buf, size_t size) | |||
822 | 822 | ||
823 | if (len > SIMPLE_TRANSACTION_LIMIT) { | 823 | if (len > SIMPLE_TRANSACTION_LIMIT) { |
824 | printk(KERN_ERR "%s: context size (%u) exceeds payload " | 824 | printk(KERN_ERR "%s: context size (%u) exceeds payload " |
825 | "max\n", __FUNCTION__, len); | 825 | "max\n", __func__, len); |
826 | length = -ERANGE; | 826 | length = -ERANGE; |
827 | goto out3; | 827 | goto out3; |
828 | } | 828 | } |
@@ -1761,7 +1761,7 @@ static int sel_fill_super(struct super_block * sb, void * data, int silent) | |||
1761 | out: | 1761 | out: |
1762 | return ret; | 1762 | return ret; |
1763 | err: | 1763 | err: |
1764 | printk(KERN_ERR "%s: failed while creating inodes\n", __FUNCTION__); | 1764 | printk(KERN_ERR "%s: failed while creating inodes\n", __func__); |
1765 | goto out; | 1765 | goto out; |
1766 | } | 1766 | } |
1767 | 1767 | ||
diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c index 4a14348de876..face5795c760 100644 --- a/security/selinux/ss/services.c +++ b/security/selinux/ss/services.c | |||
@@ -413,7 +413,7 @@ static int context_struct_compute_av(struct context *scontext, | |||
413 | return 0; | 413 | return 0; |
414 | 414 | ||
415 | inval_class: | 415 | inval_class: |
416 | printk(KERN_ERR "%s: unrecognized class %d\n", __FUNCTION__, tclass); | 416 | printk(KERN_ERR "%s: unrecognized class %d\n", __func__, tclass); |
417 | return -EINVAL; | 417 | return -EINVAL; |
418 | } | 418 | } |
419 | 419 | ||
@@ -2206,7 +2206,7 @@ int security_get_permissions(char *class, char ***perms, int *nperms) | |||
2206 | match = hashtab_search(policydb.p_classes.table, class); | 2206 | match = hashtab_search(policydb.p_classes.table, class); |
2207 | if (!match) { | 2207 | if (!match) { |
2208 | printk(KERN_ERR "%s: unrecognized class %s\n", | 2208 | printk(KERN_ERR "%s: unrecognized class %s\n", |
2209 | __FUNCTION__, class); | 2209 | __func__, class); |
2210 | rc = -EINVAL; | 2210 | rc = -EINVAL; |
2211 | goto out; | 2211 | goto out; |
2212 | } | 2212 | } |